CN107578365A - Small echo digital watermark embedding and extracting method based on quantum weeds optimizing mechanism - Google Patents

Small echo digital watermark embedding and extracting method based on quantum weeds optimizing mechanism Download PDF

Info

Publication number
CN107578365A
CN107578365A CN201710810395.5A CN201710810395A CN107578365A CN 107578365 A CN107578365 A CN 107578365A CN 201710810395 A CN201710810395 A CN 201710810395A CN 107578365 A CN107578365 A CN 107578365A
Authority
CN
China
Prior art keywords
mrow
msubsup
quantum
weeds
msub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710810395.5A
Other languages
Chinese (zh)
Other versions
CN107578365B (en
Inventor
高洪元
池鹏飞
张晓桐
杜亚男
刁鸣
白永珍
刘丹丹
苏雪
翟彤彤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Engineering University
Original Assignee
Harbin Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Engineering University filed Critical Harbin Engineering University
Priority to CN201710810395.5A priority Critical patent/CN107578365B/en
Publication of CN107578365A publication Critical patent/CN107578365A/en
Application granted granted Critical
Publication of CN107578365B publication Critical patent/CN107578365B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention provides a kind of small echo digital watermark embedding and extracting method based on quantum weeds optimizing mechanism, belong to Information Hiding Techniques field.Specific implementation process is:Binaryzation is carried out to watermarking images, and the watermarking images after binaryzation are encrypted.Watermarking images after carrier image and encryption are transformed in wavelet field, it is divided into multiple embedded points in carrier image, according to the different parameters of quantum weeds optimizing mechanism optimization, watermark is embedded in using additivity or multiplicative updates, the insertion of time domain completion watermark is then transformed to by wavelet reconstruction;The extracting method of watermark is corresponding with embedding grammar, wavelet field is transformed to containing watermarking images, the watermark after different embedded points extracts scrambling encryption according to different parameters, it is integrated into complete watermark, it is then converted in time domain, the watermark extracted by scrambling resumption.Compare with existing method, the not sentience, robustness and security of this method are obtained for raising, with more practicality.

Description

Small echo digital watermark embedding and extracting method based on quantum weeds optimizing mechanism
Technical field
The invention provides a kind of small echo digital watermarking multiple spot based on quantum weeds optimizing mechanism is embedded and extracting method, Belong to Information Hiding Techniques field.
Background technology
Digital image watermarking technology is an important directions of Information Hiding Techniques, continuous with computer process ability Enhancing, the ability to break a code improve constantly, traditional encryption technology faces enormous challenge.On the other hand, with computer The popularization of communication network and Internet technology, multimedia digital rich choice of products daily life, but simultaneously as network The opening and sharing of transmission, multimedia digital product are very easy to be replicated, distorted, or even are maliciously deleted, numeral production The copyright problem of product is extremely urgent.From nineteen ninety-five, since digital watermarking comes into vogue, the research of digital watermarking achieves preferably Achievement in research.In early days, the research of digital watermarking concentrates on spatial domain watermark, and the ability of its anti-geometric distortion is strong, but embedded information Amount is few.At present, the research of watermark is concentrated mainly on transform domain, and the insertion of watermark is completed by changing coefficient in transform domain.In document Existing transform domain mainly includes:Discrete cosine transform (DCT), discrete Fourier transform (DFT), wavelet transform (DWT), Hadamard (Hadamard) conversion, KLT conversion etc..Wherein DCT, DFT, DWT are the most commonly used, and wavelet transform is unique due to it Time frequency analysis characteristic, can not only preferably be matched with human visual system (HVS), and and JPEG2000, MPEG4 it is isobaric Contracting standard is compatible.Therefore the wavelet field for watermark being embedded into carrier image can obtain good not sentience and preferable robust Property.
Found by the retrieval to prior art literature, WANG Xiaohong, Sun Ye is waited by force《Photoelectron laser》(2017, Vol.28, No.4, pp.419-426) on profit in " the area-of-interest watermarking algorithm decomposed based on QR codes and Schur " delivered Human visual system (HVS) notable figure is decomposed and met with the relatively low Schur of time complexity, is taken by notable figure normalization Embedment strength is used as after anti-, adaptive is embedded into the watermark after encryption carrier image through Schur points of wavelet transformation and piecemeal In the coefficient of solution.This method makes the robustness of watermark be improved, but the not sentience of watermark has declined;Mashruha Raquib Mitashe etc. exist《2017IEEE Internation Conference Image, Vision&Pattern Recognition》" the A adaptive digital image delivered on (13-14, Feb.2017, pp.1-5) Watermarking scheme with PSO, DWT and XFCM " propose it is a kind of based on improve fuzzy C-means clustering from Digital figure watermark model, the models coupling particle swarm optimization algorithm and fuzzy C-means clustering is adapted to carry out in advance carrier image Processing, select the insertion watermark of host image suitable position fragment, using this method insertion watermark can not perceptible aspect take Certain effect was obtained, but its robustness is not significantly improved.
Existing data shows that the not sentience and robustness of digital figure watermark are that a pair of conflicting performances refer to Mark.Conventional digital image water mark method is all based on the selection of many experiments experience and is appropriately embed intensity and embedded location insertion water Print, this method has certain effect, but spent material resources and manpower are very huge.For this complexity system of watermark System, some adaptive algorithms proposed in recent years are often absorbed in the not sentience and robustness one party for improving watermaking system The performance in face, it is impossible to effectively take into account both unifications, the certain methods of proposition are suitable only for certain fields, and engineering application value is not It is high.Therefore, a kind of small echo digital watermark embedding and extracting method based on quantum weeds optimizing mechanism are proposed in this patent. The not sentience and robustness of digital figure watermark are considered in this method simultaneously, by reasonably selecting both object functions Weight coefficient, a continuous multi-objective optimization question is converted into single-object problem, by selecting multiple embedded points, By the scattered different zones for being embedded into carrier image wavelet transformed domain of watermark information, and incorporating quantum calculates and colony intelligence pursuit airplane System devises quantum weeds optimizing mechanism, and adaptive being realized to multiple embedding parameters optimizes.The insertion that last basis has optimized Parameter realizes that the multiple spot of digital picture is embedded and extracts.Simulation results show, the small echo based on quantum weeds optimizing mechanism Digital watermark embedding and extracting method have more preferable not sentience, and being made an uproar in Gaussian noise and the spiced salt compared with existing method Under acoustic environment, watermark robustness that small echo digital watermark embedding and extracting method based on quantum weeds optimizing mechanism extract It is stronger.
The content of the invention
The invention provides a kind of small echo digital watermark embedding and extracting method based on quantum weeds optimizing mechanism, its mesh Be provide that a kind of not sentience based on high, fast convergence rate the quantum weeds optimizing mechanism of convergence precision is strong, robust The high small echo digital watermark embedding of property and extracting method.
The object of the present invention is achieved like this:
Step 1, binaryzation watermarking images go forward side by side line shuffle encryption.To watermark binaryzation, watermarking images can be effectively reduced Redundant data, strengthen the not sentience of watermark.
Step 2, wavelet transformation is carried out to the watermarking images after carrier image and scrambling encryption.
Step 3, the multiple spot insertion of encrypted watermark.
Step 4, the multiple spot extraction of watermark and scrambling resumption.
Step 5, initialize quantum weed population.
Step 6, calculate the fitness of every plant of quantum weeds.
Step 7, growth and breeding.
Step 8, space diffusion.
Step 9, calculate the fitness of new caused quantum weeds, competition exclution.Calculated according to step 3 and step 4 new The fitness of caused quantum weeds.
Step 10, judge whether to meet end condition, if satisfied, then stopping, exporting optimal quantum weeds, be designated as Gb, it is no Then iterations adds 1, return to step seven.
Step 11, by GbMapping obtains corresponding embedment strength, embedded location, embedded length and section length, performs Step 1: two and three embedded watermark, obtain being embedded in the image after watermark;Watermark is extracted according to step 4.
Incorporating quantum of the present invention calculates and bionical swarm intelligence, devises quantum weeds intelligent search mechanism, examines simultaneously Consider the not sentience and robustness of digital picture watermarks system, and watermark not sentience is being improved using multiple spot embedded mode While with robustness, the security of watermark information is improved.
Compared with prior art, method provided by the invention has advantages below:
(1) present invention not only increases the not sentience of digital figure watermark, and improves its robustness, digitized map As watermaking system performance is improved, with more practicality.
(2) the quantum weeds Optimization Mechanism that the present invention designs simplifies former weed invasion method Evolution Strategies, avoids numerous Miscellaneous parameter setting, there is the advantages that parameter setting is simple, and amount of calculation is few.
(3) digital figure watermark multiple spot insertion provided by the invention and extracting method, not only make digital picture watermarks system Do performance to improve, and make it that the decryption of watermark is more complicated, enhance the security of watermark.
Brief description of the drawings
Small echo digital watermarking multiple spot insertion and extracting method schematic diagram of the Fig. 1 based on quantum weeds.
Image (Fig. 2 .b), original watermark image after the insertion watermark that Fig. 2 carrier images (Fig. 2 .a), the present invention obtain The watermark that the present invention extracts under watermarking images (Fig. 2 .d) and noise-free environment after (Fig. 2 .c), Arnold scrambling encryptions (Fig. 2 .e).
Fig. 3 is not added with the case of attacked by noise, and (Fig. 3 .c) of the invention is based on particle swarm optimization algorithm (Fig. 3 .b) with existing And the small echo digital figure watermark single-point insertion of genetic algorithm (Fig. 3 .a) and the not sentience contrast simulation knot of extracting method Fruit.
It is (Fig. 4 .c) of the invention and existing based on particle swarm optimization algorithm (figure when Fig. 4 Gaussian noises intensity is 0.0001 4.b) and genetic algorithm (Fig. 4 .a) small echo digital figure watermark single-point insertion and extracting method robustness contrast simulation knot Fruit.
When Fig. 5 salt-pepper noises intensity is 0.01, of the invention (5.c) and existing particle swarm optimization algorithm (Fig. 5 .b) is based on And the small echo digital figure watermark single-point insertion of genetic algorithm (5.a) and the robustness contrast simulation result of extracting method.
Fig. 6 iterationses 100 times, independent repeated trials 100 times, it is of the invention and it is existing based on particle swarm optimization algorithm and The iterativecurve comparison diagram that the small echo digital figure watermark single-point insertion of genetic algorithm and extracting method obtain.
Fig. 7 iterationses 100 times, independent repeated trials 100 times, the present invention and the small echo based on invasive weed optimized algorithm The iterativecurve comparison diagram that digital figure watermark multiple spot is embedded in and extracting method obtains.
Embodiment
Method provided by the invention is specifically described below:
Step 1, binaryzation watermarking images go forward side by side line shuffle encryption.To watermark binaryzation, watermarking images can be effectively reduced Redundant data, strengthen the not sentience of watermark.If the coefficient matrix of the watermarking images after binaryzation is W, size isCombining encryption technology does scrambling encryption to the watermarking images coefficient matrix W of binaryzation, makes the information of watermark unreadable, Increase the security of watermark.
Step 2, wavelet transformation is carried out to the watermarking images after carrier image and scrambling encryption.If the coefficient of carrier image Matrix is V, and size is M × M.K (K >=3) level wavelet decomposition is carried out to V and obtains the wavelet coefficient sequence V of carrier image0.Wherein Low frequency, level, vertical and four sub-bands of high frequency are all can obtain per level of decomposition, and low frequency sub-band can continue to decompose, altogether 3K+1 sub-band can be obtained.The low frequency that the high frequency and K levels decomposed except the first order decomposes, its sub-bands is intermediate frequency Band, note midband wavelet coefficient sequence is Vmid.K ' (K ' < K) level wavelet transformation is carried out to the coefficient matrix after scrambling encryption to obtain The wavelet coefficient sequence W of watermarking images after to scrambling encryption0
Step 3, the multiple spot insertion of encrypted watermark.Put and be embedded in for N (N >=2), in carrier image midband wavelet coefficient Sequence VmidAccording to embedded location T=[T1,T2,...,TN] and section length m=[m1,m2,...,mN] it is divided into N sections, wherein the J (j=1,2 ..., N) section VjRepresent that from original position label be TjThe m of beginningjThe sequence of individual wavelet coefficient composition.According to insertion Length L=[L1,L2,...,LN],Lj< mj(j=1,2 ..., N) the wavelet coefficient sequence W of watermarking images after scrambling encryption0 It is divided into N sections, is designated as Wj(j=1,2 ..., N).The embedding grammar of watermark uses additivity rule V 'j=Vjj·WjOr multiplying property method Then V 'j=Vj(1+αj·Wj), wherein αjFor the embedment strength of jth section watermark.V 'jAgain it is spliced into V 'mid, pass through small echo weight Structure is designated as V ' to the image after embedded watermark, its coefficient matrix, the similarity table of image and carrier image after embedded watermark Show as follows
Wherein Fxor() represents XOR function, Vx,y,Vx′,yCarrier image coefficient matrix is in x rows y before and after representing embedded watermark The value of row.Sign () represents to take sign function.
Step 4, the multiple spot extraction of watermark and scrambling resumption.K level wavelet decompositions are carried out to the image after embedded watermark, According to the embedded location T of watermark, embedded length L, section length m in its midband, in corresponding position according to W 'j=(V 'j- Vj)/αjOr W 'j=(V 'j/Vj-1)/αj, the watermark wavelet coefficient sequence after encryption is extracted, is extracted by scrambling resumption Watermark information.Watermarking images are obtained by K ' level wavelet reconstructions.Its coefficient matrix is designated as W ', the watermarking images extracted and The similarity of the watermarking images of binaryzation represents as follows
Wherein Wx,y,W′x,yCarrier watermark and the value that the watermarking images coefficient matrix extracted arranges in x rows y are represented respectively.
Step 5, initialize quantum weed population.Quantum weed population scale Mmax, maximum iteration tmax, due to this The parameter being related in method design has:Segments N, embedment strength vector α, embedded location vector T, each section of watermarking images wavelet systems Several embedded length vector L, the section length vector m of each section of carrier image wavelet coefficient.So put for more (N >=2) embedding Enter, the i-th (i=1,2 ..., M in t generationsmax) strain quantum weedsIt is expressed as
WhereinWithRespectively N Duan Shuiyin embedment strength, embedded location quantum state corresponding with embedded length,It is N section carrier figures As section length corresponding to quantum state.The embedment strength of jth (j=1,2 ..., N) section watermark and the specific of its quantum state are reflected The relation of penetrating is
The specific mapping relations of the corresponding quantum state of embedded location are
The specific mapping relations of the corresponding quantum state of embedded length are
The specific mapping relations of the corresponding quantum state of section length are
Wherein Fround() represents bracket function nearby.un,ln(n=1,2 ..., 4N) represent the n-th bound for tieing up variable.
Step 6, calculate the fitness of every plant of quantum weeds.According to mapping relations, by i-th plant of quantum weedsResiding Quantum state is mapped as the embedding parameter of N points insertionRoot According to step three and four, its f is calculated1And f2Value, be designated asWithThe fitness of i-th plant of quantum weeds plant is
Wherein 0 < δ < 1 represent weight coefficient, are constant, not sentience and robustness can be adjusted by changing δ size Shared proportion.Current quantum weeds are ranked up according to fitness value, wherein the maximum quantum weeds plant quilt of fitness It is labeled asRepresent the optimal quantum weeds plant in current population.Table Show t on behalf of only MmaxThe set that the optimal quantum weeds of memory of/4 plants of quantum weeds are formed, is initialized as when iteration starts The maximum preceding M of current fitness valuemax/ 4 plants of quantum weeds.Wherein(i=1,2 ..., Mmax/4) Represent i-th plant of quantum weeds to t on behalf of the optimal quantum weeds of memory only.
Step 7, growth and breeding.In order to avoid the calculating of too many redundancy, P is only designated as in populationtQuantum weeds can be with Produce seed.Filial generation quantum weeds in the maximum filial generation quantum weeds of fitness be designated asRepeatedly Generation is current quantum weeds when starting.Seed number caused by every plant of quantum weedsDetermined by simulating Quantum rotating gate, wherein, The transient state quantum anglec of rotation corresponding to the jth dimension variable of i-th plant of quantum weeds in t generationsIt is defined as
J=1,2 ..., 4N wherein c1,c2,c3,c4It is fixed constant for twiddle factor, r1,r2It is equal between [0,1] Even random number, the corresponding transient state quantum state of the jth dimension variable of i-th plant of quantum weeds are expressed as
Transient state quantum state residing for i-th plant of quantum weeds plant is defined as
Its caused seed numberBy rightMeasurement obtains:
r3For the random number between [0,1].The design considers all variables of quantum weeds plant to its fitness value Percentage contribution, more fully using existing information, reduce amount of calculation, while make population scale in [Mmax/2,Mmax] between Dynamic adjusts, and adds the diversity of population.
Step 8, space diffusion.Filial generation quantum weeds are by caused by the flooding mechanism of space.Quantum weeds utilize simulation The space diffusion that Quantum rotating gate completes quantum weeds produces new quantum weeds, wherein the of i-th plant of quantum weedsThe quantum rotation angle of the jth dimension variable of strain filial generation quantum weedsIt is defined as
Corresponding quantum state is expressed as
Wherein c1,c2,c3,c4,c5,c6It is fixed constant for twiddle factor, r4,r5,r6Between [0,1] it is uniform with Machine number, r are [0, Mmax/ 4] random integers between,Represent residing for the jth dimension of r strain quantum weeds in parent quantum weeds Quantum state.
Step 9, calculate the fitness of new caused quantum weeds, competition exclution.Calculated according to step 3 and step 4 new The fitness of caused quantum weeds.For i-th plant of quantum weeds and its filial generation quantum weeds, first filial generation quantum weeds each other Competition, the maximum filial generation quantum weeds of fitness, which are retained, to be denoted asOrderThenWithCompetition, if Fitness value be more thanFitness value, thenInstead ofAs parent weeds of new generationOtherwiseIt is updated toIt is allAfter completing renewal, finallyThe maximum quantum weeds renewal G of middle fitnesst+1
Step 10, judge whether to meet end condition, if satisfied, then stopping, exporting optimal quantum weeds, be designated as Gb, it is no Then iterations adds 1, return to step seven.
Step 11, by GbMapping obtains corresponding embedment strength, embedded location, embedded length and section length, performs Step 1: two and three embedded watermark, obtain being embedded in the image after watermark;Watermark is extracted according to step 4.
The insertion of small echo digital figure watermark multiple spot and extracting method provided by the invention based on quantum weeds algorithm are imitated True parameter setting is as follows:Carrier image is 256 × 256 eight grayscale images, and carrier watermark is 32 × 32 eight gray scales Level image, to simplify computation complexity, section length and embedded length take fixed value according to abundant experimental results.Using Arnold conversion carries out scrambling encryption.In experiment using 2 points insertion, first paragraph embedded location section for [10240,128 × 128], section length 1024, embedded length 256, embedment strength section are [0,1], and second segment embedded location section is [1024,10240-3072], section length 3072, embedded length 256 × 3, embedment strength section be [0,1] be l=[0,0, 10240,1024], u=[1,1,128 × 128,10240-3072], m=[1024,3072], L=[256,256 × 3];Respectively K=3 and K '=1 grade Haar wavelet transformations, quantum weeds algorithm phase are carried out to the watermarking images after carrier image and scrambling encryption Related parameter is arranged to:Population scale is 20, iterations 100, weight coefficient σ=0.5, rotation shadow factor c1=0.03, c2= 0.06,c3=0.02, c4=0.04, c5=0.01, c6=0.02.
Simulation result shows that the multiple spot of the small echo digital watermarking proposed by the present invention based on weeds optimizing mechanism is embedded and carries Take method to improve the not sentience of digital picture watermarks system, while also improve robustness, and safety Property.

Claims (9)

1. a kind of small echo digital watermark embedding and extracting method based on quantum weeds optimizing mechanism, it is characterised in that:(1) two-value Change watermarking images go forward side by side line shuffle encryption;(2) wavelet transformation is carried out to the watermarking images after carrier image and scrambling encryption;(3) The multiple spot insertion of encrypted watermark;(4) the multiple spot extraction of watermark and scrambling resumption;(5) quantum weed population is initialized;(6) calculate The fitness of every plant of quantum weeds;(7) growth and breeding;(8) space is spread;(9) fitness of new caused quantum weeds is calculated, Competition exclution, the fitness of quantum weeds according to caused by step 3 and step 4 calculating are new;(10) judge whether to meet to terminate Condition, if satisfied, then stopping, optimal quantum weeds are exported, are designated as Gb, otherwise iterations add 1, return (7);(11) by GbReflect Penetrate to obtain corresponding embedment strength, embedded location, embedded length and section length, perform (1), (2) and (3) and be embedded in watermark, obtain Image to after embedded watermark, watermark is extracted according to (4).
2. a kind of small echo digital watermark embeddings based on quantum weeds optimizing mechanism of according to claim 1 and extraction side Method, it is characterised in that:The process of described wavelet transformation is, if the coefficient matrix of carrier image is V, size is M × M, and V is entered Row K (K >=3) level wavelet decomposition obtains the wavelet coefficient sequence V of carrier image0, each of which level decompose all can obtain low frequency, water Flat, vertical and four sub-bands of high frequency, and low frequency sub-band can continue to decompose, and can obtain 3K+1 sub-band altogether, except The low frequency that the high frequency and K levels that the first order is decomposed decompose, its sub-bands is midband, and note midband wavelet coefficient sequence is Vmid, the small of the watermarking images after scrambling encryption is obtained to coefficient matrix progress K ' (K ' < K) level wavelet transformation after scrambling encryption Wave system Number Sequence W0
3. a kind of small echo digital watermark embeddings based on quantum weeds optimizing mechanism of according to claim 1 and extraction side Method, it is characterised in that:Described multiple spot telescopiny is to put and be embedded in for N (N >=2), in carrier image midband wavelet coefficient Sequence VmidAccording to embedded location T=[T1,T2,...,TN] and section length m=[m1,m2,...,mN] it is divided into N sections, wherein the J (j=1,2 ..., N) section VjRepresent that from original position label be TjThe m of beginningjThe sequence of individual wavelet coefficient composition, according to insertion Length L=[L1,L2,...,LN],Lj< mj(j=1,2 ..., N) the wavelet coefficient sequence W of watermarking images after scrambling encryption0 It is divided into N sections, is designated as Wj(j=1,2 ..., N), the embedding grammar of watermark use additivity rule Vj'=Vjj·WjOr multiplying property method Then Vj'=Vj(1+αj·Wj), wherein αjFor the embedment strength of jth section watermark, Vj' V is spliced into againmid, pass through small echo weight Structure is designated as V ' to the image after embedded watermark, its coefficient matrix, the similarity table of image and carrier image after embedded watermark Show as follows
<mrow> <msub> <mi>f</mi> <mn>1</mn> </msub> <mo>=</mo> <mfrac> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>x</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>M</mi> </munderover> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>y</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>M</mi> </munderover> <msub> <mi>F</mi> <mrow> <mi>x</mi> <mi>o</mi> <mi>r</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>s</mi> <mi>i</mi> <mi>g</mi> <mi>n</mi> <mo>(</mo> <mrow> <mo>|</mo> <msub> <mi>V</mi> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> </msub> <mo>-</mo> <msubsup> <mi>V</mi> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>&amp;prime;</mo> </msubsup> <mo>|</mo> </mrow> <mo>)</mo> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> <mrow> <mi>M</mi> <mo>&amp;times;</mo> <mi>M</mi> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow>
Wherein Fxor() represents XOR function, Vx,y,V′x,yCarrier image coefficient matrix arranges in x rows y before and after the embedded watermark of expression Value, sign () represent to take sign function.
4. a kind of small echo digital watermark embeddings based on quantum weeds optimizing mechanism of according to claim 1 and extraction side Method, it is characterised in that:The multiple spot extraction of described watermark and scrambling resumption process are to carry out K levels to the image after embedded watermark Wavelet decomposition, according to the embedded location T of watermark, embedded length L, section length m in wherein frequency band, corresponding position according to Wj'=(Vj′-Vj)/αjOr Wj'=(Vj′/Vj-1)/αj, the watermark wavelet coefficient sequence after encryption is extracted, passes through scrambling resumption The watermark information extracted, watermarking images are obtained by K ' level wavelet reconstructions, its coefficient matrix is designated as W ', the water extracted The similarity of the watermarking images of watermark image and binaryzation represents as follows
<mrow> <msub> <mi>f</mi> <mn>2</mn> </msub> <mo>=</mo> <mfrac> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>x</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </munderover> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>y</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </munderover> <msub> <mi>F</mi> <mrow> <mi>x</mi> <mi>o</mi> <mi>r</mi> </mrow> </msub> <mrow> <mo>(</mo> <mi>s</mi> <mi>i</mi> <mi>g</mi> <mi>n</mi> <mo>(</mo> <mrow> <mo>|</mo> <msub> <mi>W</mi> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> </msub> <mo>-</mo> <msubsup> <mi>W</mi> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>&amp;prime;</mo> </msubsup> <mo>|</mo> </mrow> <mo>)</mo> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> <mrow> <mover> <mi>M</mi> <mo>&amp;OverBar;</mo> </mover> <mo>&amp;times;</mo> <mover> <mi>M</mi> <mo>&amp;OverBar;</mo> </mover> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </mrow>
Wherein Wx,y、W′x,yCarrier watermark and the value that the watermarking images coefficient matrix extracted arranges in x rows y are represented respectively.
5. a kind of small echo digital watermark embeddings based on quantum weeds optimizing mechanism of according to claim 1 and extraction side Method, it is characterised in that:The process of described initialization quantum weed population is quantum weed population scale Mmax, greatest iteration time Number tmax, because the parameter being related in this method design has:Segments N, embedment strength vector α, embedded location vector T, each section of water Embedded length vector L, the section length vector m of each section of carrier image wavelet coefficient of watermark image wavelet coefficient, so, for more The insertion of (N >=2) point, the i-th (i=1,2 ..., M in t generationsmax) strain quantum weedsIt is expressed as
<mrow> <msubsup> <mi>q</mi> <mi>i</mi> <mi>t</mi> </msubsup> <mo>=</mo> <mo>&amp;lsqb;</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mn>1</mn> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mn>2</mn> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <mn>...</mn> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>N</mi> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>N</mi> <mo>+</mo> <mn>1</mn> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>N</mi> <mo>+</mo> <mn>2</mn> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <mn>...</mn> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mn>2</mn> <mi>N</mi> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mn>2</mn> <mi>N</mi> <mo>+</mo> <mn>1</mn> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mn>2</mn> <mi>N</mi> <mo>+</mo> <mn>2</mn> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <mn>...</mn> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mn>3</mn> <mi>N</mi> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mn>3</mn> <mi>N</mi> <mo>+</mo> <mn>1</mn> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mn>3</mn> <mi>N</mi> <mo>+</mo> <mn>2</mn> </mrow> <mi>t</mi> </msubsup> <mo>,</mo> <mn>...</mn> <mo>,</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mn>4</mn> <mi>N</mi> </mrow> <mi>t</mi> </msubsup> <mo>&amp;rsqb;</mo> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </mrow>
WhereinWithRespectively N sections water Embedment strength, the embedded location quantum state corresponding with embedded length of print,It is N section carrier images Quantum state corresponding to section length, the embedment strength of jth (j=1,2 ..., N) section watermark close with the specific mapping of its quantum state It is to be
<mrow> <msubsup> <mi>&amp;alpha;</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mi>t</mi> </msubsup> <mo>=</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mi>t</mi> </msubsup> <mo>&amp;times;</mo> <mrow> <mo>(</mo> <msub> <mi>u</mi> <mi>j</mi> </msub> <mo>-</mo> <msub> <mi>l</mi> <mi>j</mi> </msub> <mo>)</mo> </mrow> <mo>+</mo> <msub> <mi>l</mi> <mi>j</mi> </msub> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4</mn> <mo>)</mo> </mrow> </mrow>
The specific mapping relations of the corresponding quantum state of embedded location are
<mrow> <msubsup> <mi>T</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mi>t</mi> </msubsup> <mo>=</mo> <msub> <mi>F</mi> <mrow> <mi>r</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>d</mi> </mrow> </msub> <mrow> <mo>(</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mi>j</mi> <mo>+</mo> <mi>N</mi> </mrow> <mi>t</mi> </msubsup> <mo>&amp;times;</mo> <mo>(</mo> <mrow> <msub> <mi>u</mi> <mrow> <mi>j</mi> <mo>+</mo> <mi>N</mi> </mrow> </msub> <mo>-</mo> <msub> <mi>l</mi> <mrow> <mi>j</mi> <mo>+</mo> <mi>N</mi> </mrow> </msub> </mrow> <mo>)</mo> <mo>+</mo> <msub> <mi>l</mi> <mrow> <mi>j</mi> <mo>+</mo> <mi>N</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>5</mn> <mo>)</mo> </mrow> </mrow>
The specific mapping relations of the corresponding quantum state of embedded length are
<mrow> <msubsup> <mi>L</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mi>t</mi> </msubsup> <mo>=</mo> <msub> <mi>F</mi> <mrow> <mi>r</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>d</mi> </mrow> </msub> <mrow> <mo>(</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mi>j</mi> <mo>+</mo> <mn>2</mn> <mi>N</mi> </mrow> <mi>t</mi> </msubsup> <mo>&amp;times;</mo> <mo>(</mo> <mrow> <msub> <mi>u</mi> <mrow> <mi>j</mi> <mo>+</mo> <mn>2</mn> <mi>N</mi> </mrow> </msub> <mo>-</mo> <msub> <mi>l</mi> <mrow> <mi>j</mi> <mo>+</mo> <mn>2</mn> <mi>N</mi> </mrow> </msub> </mrow> <mo>)</mo> <mo>+</mo> <msub> <mi>l</mi> <mrow> <mi>j</mi> <mo>+</mo> <mn>2</mn> <mi>N</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>6</mn> <mo>)</mo> </mrow> </mrow>
The specific mapping relations of the corresponding quantum state of section length are
<mrow> <msubsup> <mi>m</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mi>t</mi> </msubsup> <mo>=</mo> <msub> <mi>F</mi> <mrow> <mi>r</mi> <mi>o</mi> <mi>u</mi> <mi>n</mi> <mi>d</mi> </mrow> </msub> <mrow> <mo>(</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>+</mo> <mn>3</mn> <mi>N</mi> </mrow> <mi>t</mi> </msubsup> <mo>&amp;times;</mo> <mo>(</mo> <mrow> <msub> <mi>u</mi> <mrow> <mi>j</mi> <mo>+</mo> <mn>3</mn> <mi>N</mi> </mrow> </msub> <mo>-</mo> <msub> <mi>l</mi> <mrow> <mi>j</mi> <mo>+</mo> <mn>3</mn> <mi>N</mi> </mrow> </msub> </mrow> <mo>)</mo> <mo>+</mo> <msub> <mi>l</mi> <mrow> <mi>j</mi> <mo>+</mo> <mn>3</mn> <mi>N</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>7</mn> <mo>)</mo> </mrow> </mrow>
Wherein Fround() represents bracket function nearby.un,ln(n=1,2 ..., 4N) represent the n-th bound for tieing up variable.
A kind of 6. small echo digital watermark embeddings based on quantum weeds optimizing mechanism of according to claim 1 And extracting method, it is characterised in that:The fitness process of described every plant of quantum weeds of calculating is, according to reflecting Relation is penetrated, by i-th plant of quantum weedsResiding quantum state is mapped as the embedding parameter of N points insertionAccording to the process of (3) and (4), its f is calculated1And f2's Value, is designated as f1 iWithThe fitness of i-th plant of quantum weeds plant is
<mrow> <msup> <mi>f</mi> <mi>i</mi> </msup> <mo>=</mo> <mi>&amp;delta;</mi> <mo>&amp;times;</mo> <msubsup> <mi>f</mi> <mn>1</mn> <mi>i</mi> </msubsup> <mo>+</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <mi>&amp;delta;</mi> <mo>)</mo> </mrow> <mo>&amp;times;</mo> <msubsup> <mi>f</mi> <mn>2</mn> <mi>i</mi> </msubsup> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>8</mn> <mo>)</mo> </mrow> </mrow>
Wherein 0 < δ < 1 represent weight coefficient, are constant, changing δ size can adjust shared by not sentience and robustness Proportion, current quantum weeds are ranked up according to fitness value, the wherein maximum quantum weeds plant of fitness is labeled ForRepresent the optimal quantum weeds plant in current population.Represent T is on behalf of only MmaxThe set that the optimal quantum weeds of memory of/4 plants of quantum weeds are formed, is initialized as current when iteration starts The maximum preceding M of fitness valuemax/ 4 plants of quantum weeds, wherein(i=1,2 ..., Mmax/ 4) represent I-th plant of quantum weeds is to t on behalf of the optimal quantum weeds of memory only.
7. a kind of small echo digital watermark embeddings based on quantum weeds optimizing mechanism of according to claim 1 and extraction side Method, it is characterised in that:The process of described growth and breeding is that P is only designated as in populationtQuantum weeds can produce seed, Pi tFilial generation quantum weeds in the maximum filial generation quantum weeds of fitness be designated asWhen iteration starts For current quantum weeds, seed number caused by every plant of quantum weedsDetermined by simulating Quantum rotating gate, wherein, in t generations The transient state quantum anglec of rotation corresponding to the jth dimension variable of i-th plant of quantum weedsIt is defined as
<mrow> <msubsup> <mi>&amp;theta;</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>=</mo> <mrow> <mo>(</mo> <msub> <mi>c</mi> <mn>1</mn> </msub> <mo>+</mo> <msub> <mi>c</mi> <mn>2</mn> </msub> <mo>&amp;CenterDot;</mo> <msub> <mi>r</mi> <mn>1</mn> </msub> <mo>)</mo> </mrow> <mrow> <mo>(</mo> <msubsup> <mi>P</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mi>t</mi> </msubsup> <mo>-</mo> <msubsup> <mi>Z</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mi>t</mi> </msubsup> <mo>)</mo> </mrow> <mo>+</mo> <mrow> <mo>(</mo> <msub> <mi>c</mi> <mn>3</mn> </msub> <mo>+</mo> <msub> <mi>c</mi> <mn>4</mn> </msub> <mo>&amp;CenterDot;</mo> <msub> <mi>r</mi> <mn>2</mn> </msub> <mo>)</mo> </mrow> <mrow> <mo>(</mo> <msubsup> <mi>G</mi> <mi>j</mi> <mi>t</mi> </msubsup> <mo>-</mo> <msubsup> <mi>Z</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mi>t</mi> </msubsup> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>9</mn> <mo>)</mo> </mrow> </mrow>
J=1,2 ..., 4N wherein c1,c2,c3,c4It is fixed constant for twiddle factor, r1,r2Between [0,1] it is uniform with Machine number, the corresponding transient state quantum state of the jth dimension variable of i-th plant of quantum weeds are expressed as
<mrow> <msubsup> <mover> <mi>q</mi> <mo>&amp;OverBar;</mo> </mover> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>=</mo> <mo>|</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mi>t</mi> </msubsup> <mo>&amp;times;</mo> <mi>c</mi> <mi>o</mi> <mi>s</mi> <mrow> <mo>(</mo> <msubsup> <mi>&amp;theta;</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>)</mo> </mrow> <mo>-</mo> <msqrt> <mrow> <mn>1</mn> <mo>-</mo> <msup> <mrow> <mo>(</mo> <msubsup> <mi>q</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mi>t</mi> </msubsup> <mo>)</mo> </mrow> <mn>2</mn> </msup> </mrow> </msqrt> <mo>&amp;times;</mo> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mrow> <mo>(</mo> <msubsup> <mi>&amp;theta;</mi> <mrow> <mi>i</mi> <mi>j</mi> </mrow> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>)</mo> </mrow> <mo>|</mo> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>10</mn> <mo>)</mo> </mrow> </mrow>
Transient state quantum state residing for i-th plant of quantum weeds plant is defined as
<mrow> <msubsup> <mover> <mi>q</mi> <mo>&amp;OverBar;</mo> </mover> <mi>i</mi> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>=</mo> <msubsup> <mover> <mi>q</mi> <mo>&amp;OverBar;</mo> </mover> <mrow> <mi>i</mi> <mo>,</mo> <mn>1</mn> </mrow> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>+</mo> <msubsup> <mover> <mi>q</mi> <mo>&amp;OverBar;</mo> </mover> <mrow> <mi>i</mi> <mo>,</mo> <mn>2</mn> </mrow> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mn>...</mn> <mo>+</mo> <msubsup> <mover> <mi>q</mi> <mo>&amp;OverBar;</mo> </mover> <mrow> <mi>i</mi> <mo>,</mo> <mn>4</mn> <mi>N</mi> </mrow> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>11</mn> <mo>)</mo> </mrow> </mrow>
Its caused seed numberBy rightMeasurement obtains:
<mrow> <msubsup> <mi>K</mi> <mi>i</mi> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> <mo>=</mo> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <mn>2</mn> <mo>,</mo> </mrow> </mtd> <mtd> <mrow> <mi>I</mi> <mi>f</mi> <mn>4</mn> <mi>N</mi> <mo>&amp;CenterDot;</mo> <msub> <mi>r</mi> <mn>3</mn> </msub> <mo>&lt;</mo> <msubsup> <mover> <mi>q</mi> <mo>&amp;OverBar;</mo> </mover> <mi>i</mi> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mn>4</mn> <mo>,</mo> </mrow> </mtd> <mtd> <mrow> <mi>I</mi> <mi>f</mi> <mn>4</mn> <mi>N</mi> <mo>&amp;CenterDot;</mo> <msub> <mi>r</mi> <mn>3</mn> </msub> <mo>&amp;GreaterEqual;</mo> <msubsup> <mover> <mi>q</mi> <mo>&amp;OverBar;</mo> </mover> <mi>i</mi> <mrow> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> </msubsup> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>12</mn> <mo>)</mo> </mrow> </mrow>
r3For the random number between [0,1].
8. a kind of small echo digital watermark embeddings based on quantum weeds optimizing mechanism of according to claim 1 and extraction side Method, it is characterised in that:The process of described space diffusion is that filial generation quantum weeds are by caused by the flooding mechanism of space, measuring Sub- weeds produce new quantum weeds using the space diffusion for simulating Quantum rotating gate completion quantum weeds, wherein i-th plant of quantum The of weedsThe quantum rotation angle of the jth dimension variable of strain filial generation quantum weedsIt is defined as
Corresponding quantum state is expressed as
Wherein c1,c2,c3,c4,c5,c6It is fixed constant for twiddle factor, r4,r5,r6It is uniformly random between [0,1] Number, r is [0, Mmax/ 4] random integers between,Represent residing for the jth dimension of r strain quantum weeds in parent quantum weeds Quantum state.
9. a kind of small echo digital watermark embeddings based on quantum weeds optimizing mechanism of according to claim 1 and extraction side Method, it is characterised in that:The fitness process of quantum weeds is caused by described calculating is new, and new produce is calculated according to (3) and (4) Quantum weeds fitness, it is competing each other for i-th plant of quantum weeds and its filial generation quantum weeds, first filial generation quantum weeds Strive, the maximum filial generation quantum weeds of fitness, which are retained, to be denoted asOrderThenAnd Pi tCompetition, if's Fitness value is more than Pi tFitness value, thenInstead of Pi tAs parent weeds P of new generationi t+1, otherwise Pi tIt is updated to Pi t+1。 All Pi tAfter completing renewal, last Pi t+1The maximum quantum weeds renewal G of middle fitnesst+1
CN201710810395.5A 2017-09-11 2017-09-11 Wavelet digital watermark embedding and extracting method based on quantum weed optimizing mechanism Active CN107578365B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710810395.5A CN107578365B (en) 2017-09-11 2017-09-11 Wavelet digital watermark embedding and extracting method based on quantum weed optimizing mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710810395.5A CN107578365B (en) 2017-09-11 2017-09-11 Wavelet digital watermark embedding and extracting method based on quantum weed optimizing mechanism

Publications (2)

Publication Number Publication Date
CN107578365A true CN107578365A (en) 2018-01-12
CN107578365B CN107578365B (en) 2020-09-11

Family

ID=61032762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710810395.5A Active CN107578365B (en) 2017-09-11 2017-09-11 Wavelet digital watermark embedding and extracting method based on quantum weed optimizing mechanism

Country Status (1)

Country Link
CN (1) CN107578365B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214974A (en) * 2018-08-31 2019-01-15 广州洪荒智能科技有限公司 A kind of portrait photo's processing method based on digital watermarking
CN109712204A (en) * 2018-11-30 2019-05-03 大连理工大学 A kind of image encryption method based on FCM cluster
CN111476701A (en) * 2020-03-18 2020-07-31 创驱(上海)新能源科技有限公司 Digital image encryption method and decryption method based on Rijndael symmetric block encryption technology
CN114693500A (en) * 2022-05-31 2022-07-01 山东科技大学 Quantum image watermarking method for tampering detection and self-recovery

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793874A (en) * 2014-02-14 2014-05-14 中北大学 Novel digital watermarking method capable of maintaining fidelity and robustness
CN103942745A (en) * 2014-04-02 2014-07-23 深圳大学 Method and system for adding watermark to image
CN105447809A (en) * 2015-12-07 2016-03-30 中国矿业大学 Weed model based encrypted domain image reversible watermarking method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793874A (en) * 2014-02-14 2014-05-14 中北大学 Novel digital watermarking method capable of maintaining fidelity and robustness
CN103942745A (en) * 2014-04-02 2014-07-23 深圳大学 Method and system for adding watermark to image
CN105447809A (en) * 2015-12-07 2016-03-30 中国矿业大学 Weed model based encrypted domain image reversible watermarking method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ABDUL MAJID, ET AL.: "A Novel scheme in Audio Watermarking using Multi-Objective Genetic Algorithm", 《ICMIT 2009: MECHATRONICS AND INFORMATION TECHNOLOGY》 *
陈欢,周永权,赵光伟: "基于混沌序列的多种群入侵杂草算法", 《计算机应用》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214974A (en) * 2018-08-31 2019-01-15 广州洪荒智能科技有限公司 A kind of portrait photo's processing method based on digital watermarking
CN109712204A (en) * 2018-11-30 2019-05-03 大连理工大学 A kind of image encryption method based on FCM cluster
CN111476701A (en) * 2020-03-18 2020-07-31 创驱(上海)新能源科技有限公司 Digital image encryption method and decryption method based on Rijndael symmetric block encryption technology
CN114693500A (en) * 2022-05-31 2022-07-01 山东科技大学 Quantum image watermarking method for tampering detection and self-recovery

Also Published As

Publication number Publication date
CN107578365B (en) 2020-09-11

Similar Documents

Publication Publication Date Title
CN107578365A (en) Small echo digital watermark embedding and extracting method based on quantum weeds optimizing mechanism
Li et al. Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network.
CN104408338B (en) A kind of three-dimensional grid model copyright authentication method
CN101493928B (en) Digital watermarking embedding, extracting and quantizing step size coordinating factor optimizing method and device
Tsougenis et al. Adaptive color image watermarking by the use of quaternion image moments
CN108520503A (en) A method of based on self-encoding encoder and generating confrontation network restoration face Incomplete image
Li et al. Image steganography based on style transfer and quaternion exponent moments
Zhang et al. An image watermarking method based on visual saliency and contourlet transform
Wang et al. STNet: A style transformation network for deep image steganography
Salimi et al. A novel watermarking method based on differential evolutionary algorithm and wavelet transform
CN115131188A (en) Robust image watermarking method based on generation countermeasure network
Mohan et al. Selective encryption and optimization based watermarking for robust transmission of landslide images
CN112862922A (en) Image filling method based on multi-feature generation network prior information guide
CN116612010A (en) Super-resolution image reconstruction method based on spectrum related information and space high-low frequency information
CN117218429A (en) Hyperspectral image classification method based on spectrum-space attention mechanism of dual-branch network
CN112686817B (en) Image completion method based on uncertainty estimation
Zhang et al. Research on image digital watermarking optimization algorithm under virtual reality technology
Jamali et al. Robust watermarking using diffusion of logo into auto-encoder feature maps
Zhang et al. A blind watermarking system based on deep learning model
Yadav et al. Lagrangian twin support vector regression and genetic algorithm based robust grayscale image watermarking
Wang et al. Wavelet-FCWAN: fast and covert watermarking attack network in wavelet domain
CN114331894A (en) Face image restoration method based on potential feature reconstruction and mask perception
Alizadeh et al. Image watermarking by Q learning and matrix factorization
Yao et al. High invisibility image steganography with wavelet transform and generative adversarial network
Arantes et al. rcgan: Learning a generative model for arbitrary size image generation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant